Quote:
Originally Posted by warfley
So you need to make this kinda save. For that purpose you can use an asymmetric encryption such as RSA. RSA gets its safety because of huge prime numbers (250+ digits) which make it nearly impossible to read the private key in time to perform a man in the middle attack.
|
RSA doesn't get it's safety just because of the generated keys being longer. That would be the main security aspect of symmetric encryption such as AES. In RSA, one of the endpoints sends their public key to the partner. Now the partner is able to encrypt his messages with this public key. This ensures that the only one able to decrypt this messages is the one with the private key matching the public key that was sent in the beginning.
This is why MITM attacks are pointless in case asymmetric encryption is used.
Quote:
Originally Posted by warfley
After the key exchange you won't need RSA anymore and thats why the class isn't used again.
|
I doubt that this is true since every message needs to be encrypted. Therefore both, the RSA algorithms and the public key of the end point needs to be used to accomplish that.